Although the FBI no longer needs to force Apple to unlock an iPhone that belonged to one of the San Bernardino terrorists, the debate must continue. Strong encryption that cannot be exploited by external or internal actors is a must for any organization.

I see wisdom behind the instinct to resist information authority. Human hierarchy tends to pyramid into increasingly fewer numbers up top. If you're going to fight for rights, there are more individuals at the bottom and more power to abuse from above.

Six California privacy and consumer groups have called on members of the US House Energy and Commerce Committee to oppose federal legislation that would wipe out California's landmark data breach notification laws.

As of September 1st 2013 in the Netherlands, a new rule applies to ICT proposals initiated by the national-level government entities (Ministries, etc.): ICT project proposals must now include a Privacy Impact Assessment (PIA).

The NSA is tapping into our digital lives, monitoring voice calls, emails, social media, and who-knows-what-else. I understand, and try to live by, one of the best pieces of advice I’ve ever received on the topic of privacy: “assume that everything you do and say is being watched and heard, always.”

Privacy and Security: Both are mandatory – and necessary. Privacy is inherent in our contemporary understanding of democracy, whereas security requires intelligence. The challenge lies in being able to find the right balance while avoiding excesses.

Does your company use those out-of-date applications where the applicant must provide his or her Social Security number and driver’s license number? If so, throw them out immediately. You could be setting your business up for a potential lawsuit.

A new proposal in California, supported by a diverse coalition including EFF and the ACLU of Northern California, is fighting to bring transparency and access to the seedy underbelly of digital data exchanges.

Under CISPA, companies can collect your information in order to "protect the rights and property" of the company, and then share that information with third parties, including the government, so long as it is for "cybersecurity purposes."

The Facebook Graph has evolved over the years in order to correlate as much information as possible, making it very easy to search. The issue is that anything you’ve ever posted publically, “Liked,” or were ever tagged in can be quickly searched. Here is how you can protect your privacy...

In a brief filed on Friday, EFF continued its fight against secret surveillance law, asking the D.C. Circuit Court of Appeals to order the release of a secret opinion of the Office of Legal Counsel (OLC).

The HTC settlement is not based on high-profile breaches. Instead, it points out: “HTC America failed to employ reasonable and appropriate security practices in the design and customization of the software on its mobile devices”.